All current Threat Intelligence Courses courses in 2024
104 Courses
Automated Cyber Security Incident Response
Automated Cyber Security Incident Response
This course aims to provide participants with a comprehensive understanding of incident response processes and workflows. The course covers various aspects of automating incident response mechanisms, including centralizing and automating operations, scaling the alert management process, and advanced top.

Generative AI: Boost Your Cybersecurity Career
This short course provides cybersecurity professionals and enthusiasts with the latest Generative AI tools to address complex cybersecurity challenges. The course focuses on combating the exploitation of undetected vulnerabilities for which organizations increasingly turn to Artificial Intelligence (AI) and Machine Learning (ML).
Generative A.

Advanced Threat Hunting and Incident Response
Advanced Threat Hunting and Incident Response
In the ever-evolving landscape of cybersecurity, organizations face escalating threats that demand advanced skills in threat hunting and incident response. This comprehensive course is designed to empower participants with advanced techniques to not only detect but effectively respond to cybersecurity.

Cyber Security Advanced Persistent Threat Defender Preview
Event Title: Cyber Security Advanced Persistent Threat Defender Preview
Description: Join our comprehensive workshop and gain the skills to detect and neutralize sophisticated cyber threats effectively. This engaging session is perfect for individuals looking to deepen their understanding of advanced cybersecurity techniques.
University: Not Applic.

MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training
This journey begins with the MITRE ATT&CK® framework, a globally-accessible knowledge base and model for cyber adversary behavior based on real-world observations. ATT&CK® Fundamentals will not only familiarize you with how the ATT&CK® knowledge base documents real-world adversary tactics, techniques, and procedures (TTPs), but also introduce the.
Microsoft Azure Security Center: Securing Cloud Resources
Keep your cloud resources secure with Microsoft Azure Security Center. Explore how to work with the console, set up resources, leverage advanced cloud defense capabilities, and more.

Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK
Red team operations are most effective when tailored to test an organization's defenses against the most likely threat. Learn to leverage MITRE ATT&CK in combination with open source tools in the red team tools path to emulate APT attacks.Resources and time are limited and validation of security operations capabilities and defenses is elusive if no.

Microsoft Azure Security Engineer: Monitor Security Using Azure Sentinel
Microsoft Azure Security Engineer: Monitor Security Using Azure Sentinel
Azure Sentinel delivers intelligent security analytics and threat intelligence, offering a unified solution for alerts, threat visibility, proactive hunting, and threat response. This course, Microsoft Azure Security Engineer: Monitor Security Using Azure Sentinel, will tea.

Cyber Security Incident Response for Managers
Title: Cyber Security Incident Response for Managers
Description: Understand how to manage and counteract cyber security threats effectively within your organization through this focused course on cyber security incident response. Discover the direct damages such as hacking or malware, the business repercussions including regulatory sanctions and r.

Cybersecurity Analyst Assessment
Embark on the final step towards mastering cybersecurity with the IBM Cybersecurity Analyst Professional Certificate. This culminating assessment is designed to showcase your comprehensive knowledge of cybersecurity. Successfully demonstrate your skills in:
Roles and responsibilities within cybersecurity
System administration essentials
Identifyin.
